Introduction
Securing mobile devices
()
What you should know
()
1. Considering the Need for Security
Risks of technology
()
Risks of mobile devices
()
Acquire a device securely
()
Dispose of a device securely
()
Dispose of an Android device
()
Dispose of an iOS device
()
The layers of mobile device security
()
Securing mobile accounts
()
Securing device access
()
Securing device backups
()
2. Securing an Android Device
Set up a Google Play account
()
Set up a Google family account
()
Securing device access
()
Updating Android software
()
Lock screen security for Android
()
Enable Find My Mobile security
()
Android backup and restore
()
Set up two-factor authentication
()
3. Securing an iOS Device
iOS backup and restore
()
Set up an Apple ID
()
Security for iTunes Family Sharing accounts
()
Securing device access
()
Update iOS software
()
Lock screen security
()
Find My iPhone
()
iOS privacy options
()
iOS security through careful use and Screen Time
()
Set up two-factor authentication
()
4. Security through Mobile Management
Defining a managed mobile device
()
Understanding Apple Business Manager
()
Understanding Android Enterprise
()
5. Securing Device Hardware
Design for security
()
Understanding mobile device hardware risk
()
Cameras and microphones
()
Screen protectors
()
Sensors and radios
()
Glossary_LearningMobileDeviceSecurity.pdf
(139 KB)